Title: Covert timing channels in cloud: a mathematical analysis

Trusted and untrusted networks in cloud environment are not allow to
communicate with each other directly but they might share some common
paths. These common paths give chances to attackers in untrusted
networks to steal secrets from trusted networks by exploiting packet
arrival intervals, so-called covert timing channels. We build a
mathematical model for these channels to analyse their channel capacity.
We demonstrate that these channels are very sensitive to the normal
background traffic. We also develop an analysis to reason about the
effectiveness of one of mitigation methods?randomly select paths for
packet flows.